Analysis

  • max time kernel
    120s
  • max time network
    127s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    10-03-2024 23:01

General

  • Target

    Windows/Email-Worm/Email-Worm.Win32.Pikachu/Pikachu.exe

  • Size

    32KB

  • MD5

    715614e09261b39dfa439fa1326c0cec

  • SHA1

    52d118a34da7f5037cde04c31ff491eb25933b18

  • SHA256

    e1dfc005d5403fb2f356276f0abe19df68249ce10e5035450926d56c2f8d3652

  • SHA512

    fe905c388b0711f54941076a29b11f2b605655b4a3f409d9f0f077f2fe91f241401035310daa490afb6df50a6deff5456be5ee86984e7b9069506efa07af51ae

  • SSDEEP

    384:JuttXvHydgJdONTjJJbIR1ozOtEZcrkTuztHTYhEWS6uyd:JaXfy2dmjJJcAaDkTEdjR6uy

Score
5/10

Malware Config

Signatures

  • Drops file in System32 directory 14 IoCs
  • Drops file in Windows directory 3 IoCs
  • Modifies Internet Explorer settings 1 TTPs 9 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of FindShellTrayWindow 3 IoCs
  • Suspicious use of SendNotifyMessage 2 IoCs
  • Suspicious use of SetWindowsHookEx 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Windows\Email-Worm\Email-Worm.Win32.Pikachu\Pikachu.exe
    "C:\Users\Admin\AppData\Local\Temp\Windows\Email-Worm\Email-Worm.Win32.Pikachu\Pikachu.exe"
    1⤵
    • Suspicious use of SetWindowsHookEx
    PID:1704
  • C:\Program Files (x86)\Microsoft Office\Office14\OUTLOOK.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\OUTLOOK.EXE" -Embedding
    1⤵
    • Drops file in System32 directory
    • Drops file in Windows directory
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of SetWindowsHookEx
    PID:2980

Network

MITRE ATT&CK Matrix ATT&CK v13

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Microsoft\FORMS\FRMCACHE.DAT
    Filesize

    235KB

    MD5

    ad1e47bc2039914e3b5cc98ee7e3e140

    SHA1

    f456b2173ade9762789634d68f0f5430d91a8ff0

    SHA256

    901c9ca33cb1f5b5cb57f784c395d15c9fb950279f9b04c8af40670386325436

    SHA512

    60722b090f01cb2cf724542d8ed19d18f69e28523c4a30de94a3d032f9993cc3c5cfc0b873a71e53042d12bc76b4edfec9bc1400e1315df8d2c4d8c471d56441

  • C:\Users\Admin\AppData\Local\Microsoft\FORMS\FRMCACHE.DAT
    Filesize

    240KB

    MD5

    36256e907fdd22c0c184364cb78621ed

    SHA1

    cd2cf8e4433f6469ab07e279d88f0be79300fa35

    SHA256

    744a37b1e2a116b2daab3b8fb6c1611c347facce5927bbb52e97c2bef31c8793

    SHA512

    cf01aed9ea3a388feb8dd76a06eda13ac73d5b3979c7d547f73cf8e3fef822917d70c7da37231707a53ab0d089a2c693478df2cfcfb395e3bdc4cdad6e1144b6

  • C:\Users\Admin\AppData\Local\Microsoft\Outlook\mapisvc.inf
    Filesize

    1KB

    MD5

    48dd6cae43ce26b992c35799fcd76898

    SHA1

    8e600544df0250da7d634599ce6ee50da11c0355

    SHA256

    7bfe1f3691e2b4fb4d61fbf5e9f7782fbe49da1342dbd32201c2cc8e540dbd1a

    SHA512

    c1b9322c900f5be0ad166ddcfec9146918fb2589a17607d61490fd816602123f3af310a3e6d98a37d16000d4acbbcd599236f03c3c7f9376aeba7a489b329f31

  • memory/2980-3-0x000000005FFF0000-0x0000000060000000-memory.dmp
    Filesize

    64KB

  • memory/2980-4-0x000000007363D000-0x0000000073648000-memory.dmp
    Filesize

    44KB

  • memory/2980-104-0x0000000073A91000-0x0000000073A92000-memory.dmp
    Filesize

    4KB

  • memory/2980-130-0x000000007363D000-0x0000000073648000-memory.dmp
    Filesize

    44KB